QUESTION 101IPv6 has a vastly larger address space than IPv4. This expansion provides flexibility in allocating addresses and routing traffic and eliminates the primary need for network address translation (NAT). Do you know how many more bits there are in an IPv4 address compared to an IPv6 address?

QUESTION 102You want to test the performance of one of the Windows 8 clients in the office by using XPerf.exe. You have started a trace with BASE Kernel Group and cswitch Kernel Flag.xperf -on base+cswitchYou now want to stop the trace and save it in a file called mytrace.etl. Which command should you use?

QUESTION 103Group Policy is a set of rules which control the working environment of user accounts and computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications and users’ settings in an Active Directory environment. In other words, Group Policy in part controls what users can and can’t do on a computer system. Which one of these policies requires a reboot?

Answer: DExplanation:You can Turn Off Windows Defender anytime (Uninstalling it is another thing!) without rebooting.A reboot is REQUIRED when turning off DEP for Explorer.

QUESTION 104Which term is used to refer to installing apps directly to a device without going through the Windows Store?

A. SQL InjectionB. BranchCacheC. DLL HijackD. Sideloading

Answer: DExplanation:Sideloading, which is available in both Windows 8 Release Preview and Windows Server 2012, refers to installing apps directly to a device without going through the Windows Store. LOB apps do not need to be certified by Microsoft and cannot be installed through the Windows Store but they must be signed with a certificate chained to a trusted root certificate. We recommend that IT administrators use the same technical certification that is done by the Windows Store on LOB apps.QUESTION 105The Windows Assessment and Deployment Kit (ADK) contains tools that you can use to prepare your organization for migrating to Windows 8.Which tool could you use to migrate user settings and application settings?

Case Study 5 – ADatum (QUESTION 106 -QUESTION 112)OverviewActive Directory Environment (ADatum)The ADatum network contains a single Active Directory forest named adatum.com. The forest contains a single domain. All servers run Windows Server 2012 R2. All client computers run the 64-bit version of Windows.All of the servers and all of the client computers are Active Directory members.Active Directory Environments (Contoso)The Contoso network has a single Active Directory domain named contoso.com. The domain contains the users described in the following table.

Contoso users Microsoft System center 2012 R2 Configuration manager.Network EnvironmentsThe following list shows the relevant computers in the ADatum network: Two DHCP servers Two domain controllers A file server named Server2 A deployment server named Server1 An assessment server named Server3 A computer named Computer1 that has Windows 10 installed and is generalized and ready to be imaged.Server1 has Microsoft Deployment Toolkit (MDT) 2013 Update 1 and the Windows Deployment Services server role installed. Windows Deployment Services (WDS) has four boot images configured as shown in the following table.

WDS has an image group named ImageGroup1. ImageGroup1 includes standard images of Windows 8.1, Windows 10, and a custom Windows image named Image1.WDS and MDT are used to deploy Windows to computers. Only MDT is used to deploy Windows to tablets. Server2 has three file shares configured as shown in the following table.

The Microsoft Assessment and Planning (MAP) Toolkit is installed on Server3. Server3 has a share named Share1.Office 365 Click-to-Run Configuration FileADatum has the following Office configuration file named Configuration1.xml.

Configuration1.xml is stored in \\Server2\Share2.Configuration1.xml was used to download and create an installation source for Click-To-Run.Business GoalsADatum plans to purchase Contoso.The open source software currently used by ADatum will be replaced by Office 2013.Planned ChangesADatum plans to implement the following changes to the network: Deploy Office 2013 all ADatum users. From Configuration manager in the contoso.com domain, create a security role named MAP-role. Use MAP to discover and assess the computers in the contoso.com domain by using Active Directory Domain Services 9AD DS) computer discovery.Office Deployment RequirementsADatum will deploy the following: Office 2013 Click-to-Run to the marketing department by using Configuration1.xml Office 2013 to the sales department by using a setup customization (.msp) fileTechnical RequirementsADatum identifies the following technical requirements for the planned deployments: Configure Boot3 as the default WDS boot image. Use the principle of least privilege, whenever possible. Add a third-party Windows driver that will be deployed to tablets. Prevent users from selecting Boot1 when deploying computers by using WDS. Configure MAP for the AD DS computer discovery of the contoso.com computers. Configure the MAP-role security role for Configuration Manager computer discovery.Operating System Deployment RequirementsADatum identifies the following requirements for operating system deployments: Ensure that only the users in the IT department are allowed to deploy Image1. Ensure that Windows can be deployed to tablets by using the Compact OS option. Ensure that when an image of Computer1 is contents of Computer1 are appended to Image2.wim

QUESTION 106Hotspot QuestionYou need to meet the Office Deployment requirement for the sales department.What command should you run first? To answer, select the appropriate options in the answer area.

QUESTION 107Hotspot QuestionYou need to meet the Office deployment requirement for the marketing department.What command should you run on the marketing department computers? Hot Area:

Answer:

QUESTION 108Hotspot QuestionYou deploy Office to the marketing department computers to meet the Office deployment requirements.Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the case study.

QUESTION 109Hotspot QuestionYou need to meet the technical requirements for the default WDS boot image.What Windows PowerShell cmdlet should you run on Server1? To answer, select the appropriate options in the answer area.

QUESTION 110Hotspot QuestionYou need to assign permissions to the MAP-role security role to meet the technical requirements.What should you do? To answer, select the appropriate options in the answer area.